Open Access Open Access  Restricted Access Subscription Access

Cross- Domain Devices Interoperability


Affiliations
1 Department of Computer Science, University of South Asia, Lahore, Pakistan
 

We describe a case study of the behavior of four agents using a space based communication architecture. We demonstrate that interoperability may be achieved by the agents merely describing information about themselves using an agreed upon common ontology. The case study consists of an exercise logger, a game, a mood rendered attached to audio player and phone status observing agents. The desired scenario emerges from the independent actions of the agents.
User
Notifications
Font Size

  • . Khan, F., & Nakagawa, K. (2013). Comparative study of spectrum sensing techniques in cognitive radio networks. In Computer and Information Technology (WCCIT), 2013 World Congress on (pp. 1-8).
  • IEEE.
  • . Khan, F., Bashir, F., & Nakagawa, K. (2012). Dual head clustering scheme in wireless sensor networks. In Emerging Technologies (ICET), 2012 International Conference on (pp. 1-5). IEEE.
  • . Khan, F., Kamal, S. A., & Arif, F. (2013). Fairness improvement in long chain multihop wireless ad hoc networks. In 2013 International Conference on Connected Vehicles and Expo (ICCVE) (pp. 556-561).
  • IEEE.
  • . Khan, F. (2014). Secure communication and routing architecture in wireless sensor networks. In 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE) (pp. 647-650). IEEE.
  • . Khan, F., Jan, S. R., Tahir, M., Khan, S., & Ullah, F. (2016). Survey: Dealing Non-Functional Requirements at Architecture Level. VFAST Transactions on Software Engineering, 9(2), 7-13.
  • . Jabeen, Q., Khan, F., Khan, S., & Jan, M. A. (2016). Performance Improvement in Multihop Wireless Mobile Adhoc Networks. the Journal Applied, Environmental, and Biological Sciences (JAEBS), 6(4S), 82-92.
  • . Khan, F. (2014, May). Fairness and throughput improvement in multihop wireless ad hoc networks.
  • In Electrical and Computer Engineering (CCECE), 2014 IEEE 27th Canadian Conference on (pp. 1-6).
  • IEEE.
  • . Khan, F., Jan, S. R., Tahir, M., & Khan, S. (2015, October). Applications, limitations, and improvements in visible light communication systems. In2015 International Conference on Connected Vehicles and Expo (ICCVE)(pp. 259-262). IEEE.
  • . Khan, F., Khan, M., Iqbal, Z., ur Rahman, I., & Alam, M. (2016, September). Secure and Safe Surveillance System Using Sensors Networks-Internet of Things. In International Conference on Future Intelligent Vehicular Technologies (pp. 167-174). Springer, Cham.
  • . Khan, F., ur Rahman, I., Khan, M., Iqbal, N., & Alam, M. (2016, September). CoAP-Based RequestResponse Interaction Model for the Internet of Things. In International Conference on Future Intelligent Vehicular Technologies (pp. 146-156). Springer, Cham.
  • . Fida, N., Khan, F., Jan, M. A., & Khan, Z. (2016, September). Performance Analysis of Vehicular Adhoc Network Using Different Highway Traffic Scenarios in Cloud Computing. In International Conference on Future Intelligent Vehicular Technologies (pp. 157-166). Springer, Cham.
  • . Younas, N., Asghar, Z., Qayyum, M., & Khan, F. (2016, September). Education and Socio Economic Factors Impact on Earning for Pakistan-A Bigdata Analysis. In International Conference on Future Intelligent Vehicular Technologies (pp. 215-223). Springer, Cham.
  • . Jabeen, Q., Khan, F., Hayat, M. N., Khan, H., Jan, S. R., & Ullah, F. (2016). A Survey: Embedded Systems Supporting By Different Operating Systems. International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN, 2395-1990.
  • . Tahir, M., Khan, F., Babar, M., Arif, F., Khan, F., (2016) Framework for Better Reusability in Component Based Software Engineering. In the Journal of Applied Environmental and Biological Sciences (JAEBS), 6(4S), 77-81.
  • . Khan, S., Babar, M., Khan, F., Arif, F., Tahir, M. (2016). Collaboration Methodology for Integrating Non-Functional Requirements in Architecture. In the Journal of Applied Environmental and Biological Sciences (JAEBS), 6(4S), 63-67
  • . Shabana, K., Fida, N., Khan, F., Jan, S. R., & Rehman, M. U. (2016). Security issues and attacks in Wireless Sensor Networks. International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), 5(7), pp-81.
  • . Zeeshan, M., Khan, F., & Jan, S. R. (2016). Congestion Detection and Mitigation Protocols for Wireless Sensor Networks. International Journal of Scientific Research in Computer Science, Engineering and Information Technology
  • . Hayat, M. N., Khan, F., Khan, H., Khan, M. Y., & Shah, M. (2016). Review of Cluster-based Energy Routing Protocols for WSNs. International Journal of Interdisciplinary Research Centre
  • . Zeeshan, M., Khan, F., & Jan, S. R. (2016). Review of various Congestion Detection and Routing Protocols in Wireless Sensor Networks. International Journal of Interdisciplinary Research Centre
  • . Khan, H., Hayat, F., Khan, M. N., Khan, M. Y., & Shah, M. (2016). A Systematic Overview of Routing Protocols in WSNs. International Journal of Advanced Research in Computer Engineering & Technology, 5(7), pp-2088.
  • . Khan. W., Javeed. D., Khan. M.T., Jan. S.R., Khan, F. (2016). Applications of Wireless Sensor Networks in Food and Agriculture Sectors. International Journal of Advanced Research in Computer Engineering & Technology, 5(6), pp-2048.
  • . Khan. M.Y, Shah. M, Khan. H, Hayat. M.N, Khan. F. (2016). Amplified Forms of LEACH based Clustering Protocols for WSNs- A Survey, International Journal of Advanced Research in Computer Engineering & Technology, 5(6), pp.2053.
  • . Khan, F., Rehman, A, U., Usman, M., Tan, Z., & Puthal, D. (2017). Performance of Cognitive Radio Sensor Networks using Hybrid Automatic Repeat reQuest: Stop-and-Wait. Mobile and Network Application. Springer. In Press.
  • . Jan, M.A., Nanda, P., He, X. and Liu, R.P., 2014. PASCCC: Priority-based applicationspecific congestion control clustering protocol. Computer Networks, 74, pp.92-102.
  • . M. Alam, J. Ferreira, S. Mumtaz, M. A. Jan, R. Rebelo and J. A. Fonseca, "Smart Cameras Are Making Our Beaches Safer: A 5G-Envisioned Distributed Architecture for Safe, Connected Coastal Areas," in IEEE Vehicular Technology Magazine, vol. 12, no. 4, pp. 50-59, Dec. 2017.
  • . Jan, M.A., Nanda, P., He, X. and Liu, R.P., 2015, August. A Sybil Attack Detection Scheme for a Centralized Clustering-based Hierarchical Network. In Trustcom/BigDataSE/ISPA, 2015 IEEE (Vol. 1, pp. 318-325). IEEE.
  • . M. Alam, S. Mumtaz, M. Albano, A. Radwan, and J. Rodriguez, “Throughput fairness analysis of reservation protocols of WiMedia MAC,” 2012 International Conference on Innovations in Information Technology (IIT), Mar. 2012.
  • . Fida, N., Khan, F., Jan, M.A. and Khan, Z., 2016, September. Performance Analysis of Vehicular Adhoc Network Using Different Highway Traffic Scenarios in Cloud Computing. In International Conference on Future Intelligent Vehicular Technologies (pp. 157-166). Springer, Cham.
  • . Usman, M., He, X., Lam, K.K., Xu, M., Chen, J., Bokhari, S.M.M. and Jan, M.A., 2017. Error Concealment for Cloud-based and Scalable Video Coding of HD Videos. IEEE Transactions on Cloud Computing.
  • . Usman, M., Jan, M.A., He, X. and Nanda, P., 2016, August. Data Sharing in Secure Multimedia Wireless Sensor Networks. In Trustcom/BigDataSE/I SPA, 2016 IEEE (pp. 590597). IEEE.
  • . M. Alam, J. Ferreira, and J. Fonseca, Eds., “Intelligent Transportation Systems,” Studies in Systems, Decision and Control, 2016.
  • . Usman, M., Jan, M.A. and He, X.S., 2017. Cryptography-based Secure Data Storage and Sharing Using HEVC and Public Clouds. Information Sciences.
  • . Jan, M.A., Nanda, P., He, X. and Liu, R.P., 2016. A Sybil attack detection scheme for a forest wildfire monitoring application. Future Generation Computer Systems.
  • . M. Alam, M. Albano, A. Radwan, and J. Rodriguez, “Context Parameter Prediction to Prolong Mobile Terminal Battery Life,” Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 476–489, 2012.
  • . Jan, M., Nanda, P., Usman, M. and He, X., 2017. PAWN: a payload‐based mutual authentication scheme for wireless sensor networks. Concurrency and Computation: Practice and Experience, 29(17).
  • . Usman, M., Yang, N., Jan, M.A., He, X., Xu, M. and Lam, K.M., 2017. A joint framework for QoS and QoE for video transmission over wireless multimedia sensor networks. IEEE Transactions on Mobile Computing.
  • . Jan, M.A., Nanda, P., He, X. and Liu, R.P., 2013, November. Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network. In High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on (pp. 1400-1407). IEEE.
  • . M. Alam and J. Rodriguez, “A Dual Head Clustering Mechanism for Energy Efficient WSNs,” Mobile Lightweight Wireless Systems, pp. 380–387, 2010.
  • . Jan, M.A., Nanda, P. and He, X., 2013, June. Energy evaluation model for an improved centralized clustering hierarchical algorithm in WSN. In International Conference on Wired/Wireless Internet Communication (pp. 154-167). Springer, Berlin, Heidelberg.
  • . Yang, N., Usman, M., He, X., Jan, M.A. and Zhang, L., 2017. Time-Frequency Filter Bank: A Simple Approach for Audio and Music Separation. IEEE Access.
  • . M. Alam, M. Albano, A. Radwan, and J. Rodriguez, “Context based node discovery mechanism for energy efficiency in wireless networks,” 2012 IEEE International Conference on Communications (ICC), Jun. 2012.
  • . Jan, M.A., Khan, F., Alam, M. and Usman, M., 2017. A payload-based mutual authentication scheme for Internet of Things. Future Generation Computer Systems.

Abstract Views: 209

PDF Views: 0




  • Cross- Domain Devices Interoperability

Abstract Views: 209  |  PDF Views: 0

Authors

Muhammad Jawad Hamid Mughal
Department of Computer Science, University of South Asia, Lahore, Pakistan
P. Amad A. S.
Department of Computer Science, University of South Asia, Lahore, Pakistan

Abstract


We describe a case study of the behavior of four agents using a space based communication architecture. We demonstrate that interoperability may be achieved by the agents merely describing information about themselves using an agreed upon common ontology. The case study consists of an exercise logger, a game, a mood rendered attached to audio player and phone status observing agents. The desired scenario emerges from the independent actions of the agents.

References